An engineer needs to add protection for data in transit and have headers in the email message Which configuration is needed to accomplish this goal?
A company recently discovered an attack propagating throughout their Windows network via a file named abc428565580xyz exe The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise What must be performed to ensure detection of the malicious file?
On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed
devices?
Which Cisco security solution secures public, private, hybrid, and community clouds?
What is the process of performing automated static and dynamic analysis of files against preloaded
behavioral indicators for threat analysis?
What is the default action before identifying the URL during HTTPS inspection in Cisco Secure Firewall Threat Defense software?
An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done to resolve this issue?
In an IaaS cloud services model, which security function is the provider responsible for managing?
Which two risks is a company vulnerable to if it does not have a well-established patching solution for
endpoints? (Choose two)
Which deployment model is the most secure when considering risks to cloud adoption?
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak
control method is used to accomplish this task?
Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two)
Which algorithm provides encryption and authentication for data plane communication?